US7876901B2 - Alternative design for quantum cryptographic entangling probe - Google Patents

Alternative design for quantum cryptographic entangling probe Download PDF

Info

Publication number
US7876901B2
US7876901B2 US11/693,009 US69300907A US7876901B2 US 7876901 B2 US7876901 B2 US 7876901B2 US 69300907 A US69300907 A US 69300907A US 7876901 B2 US7876901 B2 US 7876901B2
Authority
US
United States
Prior art keywords
photon
probe
signal
quantum key
quantum
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US11/693,009
Other versions
US20080240437A1 (en
Inventor
Howard E. Brandt
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GOVERNMENT TO UNITED STATES ARMY, Secretary of
US Department of Army
Original Assignee
US Department of Army
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by US Department of Army filed Critical US Department of Army
Priority to US11/693,009 priority Critical patent/US7876901B2/en
Assigned to GOVERNMENT TO THE UNITED STATES AS REPRESENTED BY THE SECRETARY OF THE ARMY reassignment GOVERNMENT TO THE UNITED STATES AS REPRESENTED BY THE SECRETARY OF THE ARMY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BRANDT, HOWARD E, DR
Publication of US20080240437A1 publication Critical patent/US20080240437A1/en
Application granted granted Critical
Publication of US7876901B2 publication Critical patent/US7876901B2/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding

Definitions

  • This invention relates to cryptographic entangling probes used in communications.
  • H. E. Brandt “Quantum cryptographic entangling probe,” Phys. Rev. A 71, 042312(14) (2005) [1].
  • H. E. Brandt “Design for a quantum cryptographic entangling probe,” J. Modern Optics 52, 2177-2185 (2005) [2] for an optimized entangling probe attacking the BB84 Protocol, C. H. Bennett and G. Brassard, Quantum cryptography: “public key distribution and coin tossing”, Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India (IEEE, New York, 1984), pp.
  • the control qubit consists of two photon polarization-basis states of the signal, the target qubit consists of two probe photon polarization basis states, and the initial state of the probe is set by an explicit algebraic function of the error rate to be induced by the probe.
  • a method was determined for measuring the appropriate probe states correlated with the BB84 signal states and yielding maximum Renyi information to the probe.
  • the design presented in [1], [2] was limited to error rates not exceeding 1 ⁇ 4, but is generalized in the instant invention to allow a full range of error rates from 0 to 1 ⁇ 3, H. E. Brandt and J. M. Myers, J. Mod. Optics, 53, 1927-1930 (2006) [4].
  • an object of this invention is an improved probe.
  • FIG. 1 is a schematic diagram of an embodiment of a system utilizing a quantum cryptographic entangling probe.
  • FIG. 2 is flowchart of an embodiment of a method for obtaining information on a key in BB84 protocol of quantum key distribution incorporating an embodiment of a quantum cryptographic entangling probe.
  • FIG. 3 is a schematic diagram of another embodiment of a system for obtaining information on a key in BB84 protocol of quantum key distribution incorporating an embodiment of a quantum cryptographic entangling probe.
  • the present disclosure provides systems and methods for obtaining maximum Rényi information on the pre-privacy-amplified key in the BB84 protocol of quantum key distribution.
  • FIG. 1 shows a system 100 utilizing a quantum cryptographic entangling probe 300 to obtain maximum Rényi information from a transmitted signal.
  • the quantum cryptographic entangling probe 300 is presented in greater detail in the discussion regarding FIG. 3 below.
  • the transmitter 110 sends a signal photon 140 (an incident photon) through a quantum channel 130 .
  • the quantum channel 130 is an optical pathway and may be optical fiber or airspace, as non-limiting examples.
  • the quantum cryptographic entangling probe 300 entangles a probe photon (not shown) with the transmitted signal photon 140 to produce a gated probe photon 150 and a gated signal photon 160 .
  • the gated signal photon 160 is relayed to the receiver 120 , while the gated probe photon 150 is utilized by the quantum cryptographic entangling probe 300 to determine the state that will most likely be measured by the receiver 120 in response to receiving the gated signal photon 160 .
  • FIG. 2 is a flowchart depicting an embodiment of a method for obtaining information on a key in the BB84 protocol of quantum key distribution, and thus for determining the state most likely measured by a receiver.
  • a signal photon 140 is received from a transmitter 110 in step 210 .
  • a single-photon source 320 (see FIG. 3 ) is configured for producing a probe photon in step 220 .
  • the optimum probe photon polarization state, corresponding to a set error rate induced by the quantum cryptographic entangling probe 300 is determined in step 230 .
  • the signal photon 140 received in step 210 is entangled with the probe photon from step 230 to produce a gated probe photon 150 .
  • the gated probe photon 150 is separated in step 250 with polarization correlated to a signal measured by a receiver.
  • Step 260 shows that the polarization state of the gated probe photon 150 is measured.
  • the information on polarization-bases selection utilized by the transmitter and receiver is accessed on a public classical communication channel in step 270 so that the polarization state measured by the receiver 120 may be determined in step 280 .
  • each individual transmitted bit is made to interact with the probe so that the carrier and the probe are left in an entangled state, and measurement by the probe, made subsequent to measurement by the legitimate receiver, yields information about the carrier state.
  • the probe can be used in an individual attack in which each transmitted photon is measured independently, given that the polarization basis is revealed on the public communication channel. See the following references: Slutsky (1998), as above; C. A. Fuchs and A. Peres, “Quantum-state disturbance versus information gain: uncertainty relations for quantum information,” Phys. Rev. A Vol. 53, pp. 2038-2045 (1996); H. E. Brandt, “Probe optimization in four-state protocol of quantum cryptography,” Phys.
  • Equation (132) of Brandt (2004) sin ⁇ and cos ⁇ should be interchanged in the coefficient of only.
  • e 2 ⁇ should be e ⁇ .
  • Equation (195) the overall sign of the coefficient of
  • E is the error rate induced by the probe
  • w b are defined by
  • w a 2 ⁇ 1/2 (
  • w b 2 ⁇ 1/2 (
  • the optimum unitary transformation, Eq. (158) of [1] produces in this case the following entanglements for initial probe state
  • v respectively:
  • are orthogonal linearly-polarized photon signal states in the ⁇
  • v are orthogonal linearly-polarized photon signal states in the ⁇
  • the maximum information gain by the probe is again given by
  • the control qubit entering the control port of the CNOT gate consists of the two signal basis states ⁇
  • e 1 are orthonormal and make equal angles of ⁇ /8 with the nonorthogonal signal states
  • the target qubit entering the target port of the CNOT gate consists of the two orthonormal linearly-polarized photon polarization computational basis states 2 ⁇ 1/2 (
  • w b ⁇ becomes ⁇
  • e 1 enters the control port
  • the initial unnormalized target state of the probe can, in this case, be shown to be given by:
  • a 2 (1 ⁇ 2 E ) 1/2
  • a 1 (1 ⁇ 2 E ) 1/2
  • the signal photon enters the control port of a CNOT gate.
  • the initial state of the probe is a photon in linear-polarization state
  • the probe photon is produced by a single-photon source and is appropriately timed with reception of the signal photon by first sampling a few successive signal pulses to determine the repetition rate of the transmitter.
  • a 2 according to Eq. (12), is given by
  • a 2 (1 ⁇ 2 E ) 1/2
  • the entangling probe can be tuned to the chosen error rate to be induced by the probe.
  • the outgoing gated signal photon is relayed on to the legitimate receiver, and the gated probe photon enters a Wollaston prism, oriented to separate photon orthogonal-linear-polarization states
  • w + , respectively will indicate, in accord with the correlations (21) and (22), that a state
  • w ⁇ , respectively will indicate, in accord with the correlations (21) and (22), that a state
  • the likely sequence of ones and zeroes constituting the key, prior to privacy amplification can be assigned.
  • the net effect is to yield, for a set error rate E, the maximum Renyi information gain to the probe, which is given by Eq. (11).
  • An alternative design is given for an optimized quantum cryptographic entangling probe for attacking the BB84 protocol of quantum key distribution.
  • the initial state of the probe has a simpler analytical dependence on the set error rate to be induced by the probe.
  • the device yields maximum information to the probe for a full range of induced error rates.
  • the probe contains a single CNOT gate which produces the optimum entanglement between the BB84 signal states and the correlated probe states, and is measured by making a symmetric von Neumann projective test.

Abstract

An alternative design is given for an optimized quantum cryptographic entangling probe for attacking the BB84 protocol of quantum key distribution. The initial state of the probe has a simpler analytical dependence on the set error rate to be induced by the probe than in the earlier design. The new device yields maximum information to the probe for a full range of induced error rates. As in the earlier design, the probe contains a single CNOT gate which produces the optimum entanglement between the BB84 signal states and the correlated probe states.

Description

RELATED APPLICATIONS
This application is related to and claims benefit of U.S. patent application Ser. No. 11/239,461 filed 16 Sep. 2005 which, in turn claims benefit of Provisional Application 60/617,796 filed 9 Oct. 2004. This invention is a continuation-in-part and an improvement on the earlier application by the same inventor that is incorporated herein in its entirety by reference.
BACKGROUND OF THE INVENTION
1. Field of the Invention
This invention relates to cryptographic entangling probes used in communications.
2. Description of the Prior Art
Recently, a design was given by H. E. Brandt, “Quantum cryptographic entangling probe,” Phys. Rev. A 71, 042312(14) (2005) [1]. H. E. Brandt, “Design for a quantum cryptographic entangling probe,” J. Modern Optics 52, 2177-2185 (2005) [2] for an optimized entangling probe attacking the BB84 Protocol, C. H. Bennett and G. Brassard, Quantum cryptography: “public key distribution and coin tossing”, Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India (IEEE, New York, 1984), pp. 175-179 [3] of quantum key distribution (QKD) and yielding maximum Renyi information to the probe for a set error rate induced by the probe. Probe photon polarization states become optimally entangled with the BB84 signal states on their way between the legitimate transmitter and receiver. Standard von Neumann projective measurements of the probe yield maximum information on the pre-privacy amplified key, once basis information is revealed during reconciliation. A simple quantum circuit was found, consisting of a single CNOT gate, and faithfully producing the optimal entanglement. The control qubit consists of two photon polarization-basis states of the signal, the target qubit consists of two probe photon polarization basis states, and the initial state of the probe is set by an explicit algebraic function of the error rate to be induced by the probe. A method was determined for measuring the appropriate probe states correlated with the BB84 signal states and yielding maximum Renyi information to the probe. The design presented in [1], [2] was limited to error rates not exceeding ¼, but is generalized in the instant invention to allow a full range of error rates from 0 to ⅓, H. E. Brandt and J. M. Myers, J. Mod. Optics, 53, 1927-1930 (2006) [4].
SUMMARY OF THE INVENTION
Accordingly, an object of this invention is an improved probe.
These and additional objects of the invention are accomplished by a new and simpler probe design for which the induced error rate also ranges from 0 to ⅓. It is based on an alternative optimum unitary transformation in [1], also yielding the same maximum Renyi information to the probe. The initial state of the probe has a simpler algebraic dependence on the set error rate to be induced by the probe. The alternative optimized unitary transformation is reviewed, representing the action of an optimized entangling probe yielding maximum information on quantum key distribution in the BB84 protocol. In the Section QUANTUM CIRCUIT AND PROBE DESIGN that follows, the quantum circuit and design are given for the new entangling probe. The concluding Section contains a summary.
BRIEF DESCRIPTION OF THE DRAWINGS
Many aspects of the disclosure can be better understood with reference to the following drawings. The components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Moreover, in the drawings, like reference numerals designate corresponding parts throughout the several views.
FIG. 1 is a schematic diagram of an embodiment of a system utilizing a quantum cryptographic entangling probe.
FIG. 2 is flowchart of an embodiment of a method for obtaining information on a key in BB84 protocol of quantum key distribution incorporating an embodiment of a quantum cryptographic entangling probe.
FIG. 3 is a schematic diagram of another embodiment of a system for obtaining information on a key in BB84 protocol of quantum key distribution incorporating an embodiment of a quantum cryptographic entangling probe.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
Reference is now made in detail to the description of several exemplary embodiments as illustrated in the drawings. The disclosure may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are intended to convey the scope of the disclosure to those skilled in the art. Furthermore, all “examples” given herein are intended to be non-limiting.
The present disclosure provides systems and methods for obtaining maximum Rényi information on the pre-privacy-amplified key in the BB84 protocol of quantum key distribution.
FIG. 1 shows a system 100 utilizing a quantum cryptographic entangling probe 300 to obtain maximum Rényi information from a transmitted signal. The quantum cryptographic entangling probe 300 is presented in greater detail in the discussion regarding FIG. 3 below. The transmitter 110 sends a signal photon 140 (an incident photon) through a quantum channel 130. The quantum channel 130 is an optical pathway and may be optical fiber or airspace, as non-limiting examples. The quantum cryptographic entangling probe 300 entangles a probe photon (not shown) with the transmitted signal photon 140 to produce a gated probe photon 150 and a gated signal photon 160. The gated signal photon 160 is relayed to the receiver 120, while the gated probe photon 150 is utilized by the quantum cryptographic entangling probe 300 to determine the state that will most likely be measured by the receiver 120 in response to receiving the gated signal photon 160.
FIG. 2 is a flowchart depicting an embodiment of a method for obtaining information on a key in the BB84 protocol of quantum key distribution, and thus for determining the state most likely measured by a receiver. A signal photon 140, is received from a transmitter 110 in step 210. A single-photon source 320 (see FIG. 3) is configured for producing a probe photon in step 220. The optimum probe photon polarization state, corresponding to a set error rate induced by the quantum cryptographic entangling probe 300, is determined in step 230. In step 240, the signal photon 140 received in step 210 is entangled with the probe photon from step 230 to produce a gated probe photon 150. The gated probe photon 150 is separated in step 250 with polarization correlated to a signal measured by a receiver. Step 260 shows that the polarization state of the gated probe photon 150 is measured. Finally, the information on polarization-bases selection utilized by the transmitter and receiver is accessed on a public classical communication channel in step 270 so that the polarization state measured by the receiver 120 may be determined in step 280.
For the standard four-state (BB84) protocol, Bennett (1984), of quantum key distribution in quantum cryptography, an eavesdropping probe optimization was performed, by B. A. Slutsky, R. Rao, P. C. Sun, and Y. Fainman, “Security of quantum cryptography against individual attacks,” Phys. Rev. A Vol. 57, pp. 2383-2398 (1998), which is incorporated herein by reference in its entirety, which on average yields the most information to the eavesdropper for a given error rate caused by the probe. The most general possible probe consistent with unitarity was considered in which each individual transmitted bit is made to interact with the probe so that the carrier and the probe are left in an entangled state, and measurement by the probe, made subsequent to measurement by the legitimate receiver, yields information about the carrier state. The probe can be used in an individual attack in which each transmitted photon is measured independently, given that the polarization basis is revealed on the public communication channel. See the following references: Slutsky (1998), as above; C. A. Fuchs and A. Peres, “Quantum-state disturbance versus information gain: uncertainty relations for quantum information,” Phys. Rev. A Vol. 53, pp. 2038-2045 (1996); H. E. Brandt, “Probe optimization in four-state protocol of quantum cryptography,” Phys. Rev. A Vol. 66, 032303-1-16 (2002); H. E. Brandt, “Secrecy capacity in the four-state protocol of quantum key distribution,” J. Math. Phys. Vol. 43, pp. 4526-4530 (2002); H. E. Brandt, “Optimization problem in quantum cryptography,” J. Optics B Vol. 5, S557-560 (2003); H. E. Brandt, “Optimum probe parameters for entangling probe in quantum key distribution,” Quantum Information Processing Vol. 2, pp. 37-79 (2003); and H. E. Brandt, “Optimized unitary transformation for BB84 entangling probe,” SPIE Proc., Vol. 5436, pp. 48-64 (2004), all of which are incorporated herein by reference in their entirety. It should be noted that in Equation (132) of Brandt (2004), sin μ and cos μ should be interchanged in the coefficient of only. Also, e should be eθ. In Equation (195), the overall sign of the coefficient of |w2> should be ∓ rather than ±.
A complete optimization was performed by Brandt (“Probe optimization in four-state protocol of quantum cryptography,” 2002, “Optimization problem in quantum cryptography,” 2003, “Optimum probe parameters for entangling probe in quantum key distribution,” 2003, and “Optimized unitary transformation for BB84 entangling probe,” 2004 above), in which three previously unknown sets of optimum probe parameters were obtained, all yielding the identical maximum information gain by the probe. The probe optimizations were based on maximizing the Rényi information gain by the probe on corrected data for a given error rate induced by the probe in the legitimate receiver. A minimum overlap of the probe states which are correlated with the signal states (because of the entanglement) determines the maximum Rényi information gain by the probe. This is related to the idea that the more nearly orthogonal the correlated states are, the easier they are to distinguish. The upper bound on Rényi information gain by the probe is needed to calculate the secrecy capacity of the BB84 protocol and to determine the number of bits which must be sacrificed during privacy amplification in order that it be exponentially unlikely that more than token leakage of the final key be available to the eavesdropper following key distillation (see Brandt, “Secrecy capacity in the four-state protocol of quantum key distribution,” 2002).
In the present work, an implementation was determined of the optimum unitary transformation given by Eqs. (158)-(164) of [1], however with restricted parameters such that the corresponding Hilbert space of the probe reduces from four to two dimensions. In particular, the parameters μ and θ are here restricted to
sin μ=cos μ=2−1/2; cos θ=1:  (1)
In this case, the entangling probe states |σ+
Figure US07876901-20110125-P00001
, |σ
Figure US07876901-20110125-P00001
, |σ
Figure US07876901-20110125-P00001
, |δ+
Figure US07876901-20110125-P00001
, |δ
Figure US07876901-20110125-P00001
, |δ
Figure US07876901-20110125-P00001
, given by Eqs. (159)-(164) of [1], become
+
Figure US07876901-20110125-P00001
=|δ
Figure US07876901-20110125-P00001
=4[(1−2E)1/2 |w 0
Figure US07876901-20110125-P00001
−E 1/2 |w b
Figure US07876901-20110125-P00001
],  (2)
+
Figure US07876901-20110125-P00001
=|δ
Figure US07876901-20110125-P00001
=4[(1−2E)1/2 |w a
Figure US07876901-20110125-P00001
+E 1/2 |w b
Figure US07876901-20110125-P00001
],  (3)
Figure US07876901-20110125-P00001
=−|δ
Figure US07876901-20110125-P00001
=4E 1/2 |w b
Figure US07876901-20110125-P00001
,  (4)
in which the upper sign choices in Eqs. (159)-(164) of [1] have been made, E is the error rate induced by the probe, and the orthonormal probe basis vectors |wa
Figure US07876901-20110125-P00001
and |wb
Figure US07876901-20110125-P00001
are defined by
|w a
Figure US07876901-20110125-P00001
=2−1/2(|w 0
Figure US07876901-20110125-P00001
+|w 3
Figure US07876901-20110125-P00001
,  (5)
|w b
Figure US07876901-20110125-P00001
=2−1/2(|w 1
Figure US07876901-20110125-P00001
−|w 2
Figure US07876901-20110125-P00001
),  (6)
expressed in terms of the orthonormal basis vectors |w0
Figure US07876901-20110125-P00001
, |w3
Figure US07876901-20110125-P00001
, |w
Figure US07876901-20110125-P00001
, and |w2
Figure US07876901-20110125-P00001
of [1]. Thus, the optimum unitary transformation, Eq. (158) of [1] produces in this case the following entanglements for initial probe state |w
Figure US07876901-20110125-P00001
and incoming BB84 signal photon-polarization states |u
Figure US07876901-20110125-P00001
, |ū
Figure US07876901-20110125-P00001
, |v
Figure US07876901-20110125-P00001
, or | v
Figure US07876901-20110125-P00001
, respectively:
u w -> 1 4 ( u σ + + u _ σ ) , ( 7 ) u _ w -> 1 4 ( u σ + u _ σ - ) , ( 8 ) v w -> 1 4 ( v σ - - v _ σ ) , ( 9 ) v _ w -> 1 4 ( - v σ + v _ σ - ) , ( 10 )
Here, the probe states |σ+
Figure US07876901-20110125-P00001
, |σ
Figure US07876901-20110125-P00001
, |σ
Figure US07876901-20110125-P00001
are given by Eqs. (2)-(4). The states |u
Figure US07876901-20110125-P00001
and |ū
Figure US07876901-20110125-P00001
are orthogonal linearly-polarized photon signal states in the {|u
Figure US07876901-20110125-P00001
, |ū
Figure US07876901-20110125-P00001
} basis, and |v
Figure US07876901-20110125-P00001
and | v
Figure US07876901-20110125-P00001
are orthogonal linearly-polarized photon signal states in the {|v
Figure US07876901-20110125-P00001
, | v
Figure US07876901-20110125-P00001
} basis, and the two bases are nonorthogonal with π/4 angle between the linear polarizations of states |u
Figure US07876901-20110125-P00001
and |v
Figure US07876901-20110125-P00001
. In the present case, the maximum information gain by the probe is again given by
I opt R = log 2 [ 2 - ( 1 - 3 E 1 - E ) 2 ] , ( 11 )
and here E≦⅓, since E=⅓, according to Eq. (11), corresponds to perfect information gain by the probe.
Quantum Circuit and Probe Design
Using the same methods presented in [1], it can be shown that a quantum circuit consisting again of a single CNOT gate suffices to produce the optimum entanglement, Eqs. (7)-(10). Here, the control qubit entering the control port of the CNOT gate consists of the two signal basis states {|e0
Figure US07876901-20110125-P00001
, |e1
Figure US07876901-20110125-P00001
}. In the two-dimensional Hilbert space of the signal, the basis states |e0
Figure US07876901-20110125-P00001
and |e1
Figure US07876901-20110125-P00001
, respectively, are orthonormal and make equal angles of π/8 with the nonorthogonal signal states |u
Figure US07876901-20110125-P00001
and |v
Figure US07876901-20110125-P00001
, respectively. The target qubit entering the target port of the CNOT gate consists of the two orthonormal linearly-polarized photon polarization computational basis states 2−1/2 (|wa
Figure US07876901-20110125-P00001
±|wb
Figure US07876901-20110125-P00001
). When |e0
Figure US07876901-20110125-P00001
enters the control port, {|wa
Figure US07876901-20110125-P00001
, |wb
Figure US07876901-20110125-P00001
} becomes {|wa
Figure US07876901-20110125-P00001
, −|wb
Figure US07876901-20110125-P00001
}, and when |e1
Figure US07876901-20110125-P00001
enters the control port, {|wa
Figure US07876901-20110125-P00001
, |wb
Figure US07876901-20110125-P00001
} remains the same. The initial unnormalized target state of the probe can, in this case, be shown to be given by:
|A 2
Figure US07876901-20110125-P00001
=(1−2E)1/2 |w a
Figure US07876901-20110125-P00001
+(2E)1/2 |w b
Figure US07876901-20110125-P00001
,  (12)
and the unnormalized transition state is given by
|A 1
Figure US07876901-20110125-P00001
=(1−2E)1/2 |w a
Figure US07876901-20110125-P00001
−(2E)1/2 |w b
Figure US07876901-20110125-P00001
.  (13)
Next, by arguments directly paralleling those of [1], using Eqs. (7)-(10), one has the following correlations between the signal states and the projected probe states, |σ30
Figure US07876901-20110125-P00001
and |σ
Figure US07876901-20110125-P00001
:
|u
Figure US07876901-20110125-P00001
Figure US07876901-20110125-P00002
+
Figure US07876901-20110125-P00001
Figure US07876901-20110125-P00001
Figure US07876901-20110125-P00002
σ
Figure US07876901-20110125-P00001
,  (14)
and
|v
Figure US07876901-20110125-P00001
Figure US07876901-20110125-P00002
σ−
Figure US07876901-20110125-P00001
| v
Figure US07876901-20110125-P00001
Figure US07876901-20110125-P00002
σ+
Figure US07876901-20110125-P00001
,  (15)
The measurement basis for the symmetric von Neumann projective measurement of the probe must be orthogonal and symmetric about the correlated probe states, |σ+
Figure US07876901-20110125-P00001
and |σ−
Figure US07876901-20110125-P00001
in the two-dimensional Hilbert space of the probe [1]. Thus, consistent with Eqs. (2) and (3), I define the following orthonormal measurement basis states:
|w +
Figure US07876901-20110125-P00001
=2−1/2(|w a
Figure US07876901-20110125-P00001
+|w b
Figure US07876901-20110125-P00001
),  (16)
|w
Figure US07876901-20110125-P00001
=2−1/2(|w a
Figure US07876901-20110125-P00001
−|w b
Figure US07876901-20110125-P00001
).  (17)
Next, one notes that the correlations of the projected probe states |σ+
Figure US07876901-20110125-P00001
and |σ
Figure US07876901-20110125-P00001
with the measurement basis states |w+
Figure US07876901-20110125-P00001
and |w
Figure US07876901-20110125-P00001
are indicated, according to Eqs. (2), (3), (16), and (17), by the following probabilities:
w + | σ + 2 σ + 2 = w - | σ - 2 σ - 2 = 1 2 - E 1 / 2 ( 1 - 2 E ) 1 / 2 ( 1 - E ) , ( 18 ) w + | σ - 2 σ - 2 = w - | σ + 2 σ + 2 = 1 2 + E 1 / 2 ( 1 - 2 E ) 1 / 2 ( 1 - E ) , ( 19 )
consistent with Eqs. (198) and (199) of [1], and implying the following dominant state correlations:
+
Figure US07876901-20110125-P00001
Figure US07876901-20110125-P00002
w
Figure US07876901-20110125-P00001
,|σ
Figure US07876901-20110125-P00001
Figure US07876901-20110125-P00002
w+
Figure US07876901-20110125-P00001
.  (20)
Next combining the correlations (14), (15), and (20), one thus establishes the following correlations:
{|u
Figure US07876901-20110125-P00001
,| v
Figure US07876901-20110125-P00001
}
Figure US07876901-20110125-P00002
σ+
Figure US07876901-20110125-P00001
Figure US07876901-20110125-P00002
w
Figure US07876901-20110125-P00001
.  (21)
{|ū
Figure US07876901-20110125-P00001
,|v
Figure US07876901-20110125-P00001
}
Figure US07876901-20110125-P00002
σ
Figure US07876901-20110125-P00001
Figure US07876901-20110125-P00002
|w+
Figure US07876901-20110125-P00001
.  (22)
to be implemented by the projective measurement of the probe, as in [1]. One therefore arrives at the following alternative entangling probe design. An incident photon coming from the legitimate transmitter is received by the probe in one of the four signal-photon linear-polarization states |u
Figure US07876901-20110125-P00001
, |ū
Figure US07876901-20110125-P00001
, |v
Figure US07876901-20110125-P00001
, or | v
Figure US07876901-20110125-P00001
in the BB84 protocol. The signal photon enters the control port of a CNOT gate. The initial state of the probe is a photon in linear-polarization state |A2
Figure US07876901-20110125-P00001
entering the target port of the CNOT gate. The probe photon is produced by a single-photon source and is appropriately timed with reception of the signal photon by first sampling a few successive signal pulses to determine the repetition rate of the transmitter. The photon linear-polarization state |A2
Figure US07876901-20110125-P00001
, according to Eq. (12), is given by
|A 2
Figure US07876901-20110125-P00001
=(1−2E)1/2 |w a
Figure US07876901-20110125-P00001
+(2E)1/2 |w b
Figure US07876901-20110125-P00001
,  (23)
and can be simply set for an error rate E by means of a polarizer. (Note that this initial probe state has a simpler algebraic dependence on error rate than that in [1] or [4]).
In accord with Eq. (23), the entangling probe can be tuned to the chosen error rate to be induced by the probe. The outgoing gated signal photon is relayed on to the legitimate receiver, and the gated probe photon enters a Wollaston prism, oriented to separate photon orthogonal-linear-polarization states |w+
Figure US07876901-20110125-P00001
and |w
Figure US07876901-20110125-P00001
, and the photon is then detected by one of two photodetectors. This is an ordinary symmetric von Neumann projective measurement. If the basis, revealed during the public basis-reconciliation phase of the BB84 protocol, is {|u
Figure US07876901-20110125-P00001
, |ū
Figure US07876901-20110125-P00001
}, then the photodetector located to receive the polarization state |w
Figure US07876901-20110125-P00001
or |w+
Figure US07876901-20110125-P00001
, respectively, will indicate, in accord with the correlations (21) and (22), that a state |u
Figure US07876901-20110125-P00001
or |ū
Figure US07876901-20110125-P00001
, respectively, was most likely measured by the legitimate receiver.
Alternatively, if the announced basis is {|v
Figure US07876901-20110125-P00001
, | v
Figure US07876901-20110125-P00001
}, then the photodetector located to receive the polarization state |w30
Figure US07876901-20110125-P00001
or |w
Figure US07876901-20110125-P00001
, respectively, will indicate, in accord with the correlations (21) and (22), that a state |v
Figure US07876901-20110125-P00001
or | v
Figure US07876901-20110125-P00001
, respectively, was most likely measured by the legitimate receiver. By comparing the record of probe photodetector triggering with the sequence of bases revealed during reconciliation, then the likely sequence of ones and zeroes constituting the key, prior to privacy amplification, can be assigned. In any case the net effect is to yield, for a set error rate E, the maximum Renyi information gain to the probe, which is given by Eq. (11).
CONCLUSION
An alternative design is given for an optimized quantum cryptographic entangling probe for attacking the BB84 protocol of quantum key distribution. The initial state of the probe has a simpler analytical dependence on the set error rate to be induced by the probe. The device yields maximum information to the probe for a full range of induced error rates. As in the earlier design, the probe contains a single CNOT gate which produces the optimum entanglement between the BB84 signal states and the correlated probe states, and is measured by making a symmetric von Neumann projective test.
Obviously, many modifications and variations of the present invention are possible in light of the above teachings. It is therefore to be understood that, within the scope of the appended claims, the invention many be practiced otherwise than as specifically described.

Claims (17)

1. A system for deciphering information encoded using a quantum key by determining the polarization states of the signal photons encoding the quantum key, comprising:
a quantum entangling probe comprising:
an input for receiving signal photons having polarization states encoding a quantum key; a single-photon source for producing a probe photon;
a probe photon polarizer; a quantum controlled-NOT (CNOT) gate configured to provide entanglement of a signal photon with the probe photon so that the signal photon and the probe photon have entangled polarization states to obtain information on the quantum key; the quantum controlled-NOT (CNOT) gate comprising first and second outputs; the first output operating to output the probe photon and the second output operating to output the signal photon; a beam splitter configured to separate the possible polarization states of the probe photon; and two photodetectors configured to measure the polarization state of the probe photon; wherein the quantum key is used for data transmission to an intended receiver and the quantum key is being intercepted by an unintended recipient and wherein the intended receiver is not able to determine that the quantum key has been intercepted and wherein the quantum CNOT gate is configured to provide entanglement of the signal photon with the probe photon so as to obtain Renyi information from the signal photon.
2. The system of claim 1, wherein the beam splitter comprises a Wollaston prism and wherein the two photodetectors comprise two single-photon detectors.
3. The system of claim 1, wherein the CNOT gate is one of a quantum dot implementation or a cavity QED implementation.
4. The system of claim 1, wherein the CNOT gate is a solid state implementation.
5. The system of claim 1, further comprising a polarization filter configured to determine an optimum initial probe photon polarization state for a set error rate induced by the quantum cryptographic entangling probe.
6. A method for deciphering data encoded through the use of a quantum key by obtaining information on a quantum key, using probe photons, the quantum key being transmitted using signal photons having photon polarization states, said method comprising:
producing a probe photon;
determining an initial probe photon polarization state of the probe photon;
entangling a signal photon transmitting a quantum key with the probe photon so that the state of the probe photon is correlated to the signal photon state; and
measuring the polarization state of the probe photon to determine the correlated photon state measured by the legitimate receiver;
wherein the quantum key is in the BB84 protocol of quantum key distribution and wherein the step of entangling comprises entangling the signal with the probe photon polarization state so as to obtain Renyi information from the signal and further comprising the step of accessing information on polarization-basis selection available on a public classical communication channel between the transmitter and the receiver.
7. The method of claim 6, further comprising receiving a signal photon from a transmitter and wherein the step of producing a single probe photon comprises configuring a single-photon source to produce a probe photon.
8. The method of claim 6, wherein the step of determining an initial probe photon polarization state comprises determining an initial probe photon polarization state of the probe photon corresponding to a set error rate induced by the probe and further comprising relaying an outgoing gated signal photon to the receiver in the same state as received.
9. The method of claim 6, further comprising the step of separating possible polarization states of the probe photon utilizing a Wollaston prism subsequent to the polarization state having been correlated with a signal photon.
10. The method of claim 6, further comprising the step of separating possible polarization states of the probe photon utilizing a polarization beam splitter.
11. The method of claim 6, wherein the single-photon source is synchronized with the signal photons from the transmitter by first sampling successive signal pulses to determine a repetition rate of the transmitter.
12. A system for deciphering information encoded using a quantum key by determining the polarization states of the signal photons embodying the quantum key, comprising:
means for producing a probe photon; means for determining an initial probe photon polarization state
means for providing entanglement of the signal photon with the probe photon so as to obtain Renyi information from the signal;
the means for providing entanglement comprising a quantum controlled-NOT (CNOT) gate configured to provide entanglement of the signal photon with the probe photon so that the signal photon and the probe photon have entangled polarization states to obtain information on the quantum key;
means for separating the possible probe photon polarization states;
means for measuring the polarization state of the probe photon in order to determine the polarization state measured by the receiver.
13. The system of claim 12, wherein the means producing a probe photon comprises means for configuring a single-photon source to produce a probe photon and wherein the system further comprising means for receiving a signal photon from a transmitter.
14. The system of claim 12, further comprising means for determining an optimum initial probe photon polarization state corresponding to a set error rate induced by a probe and means for relaying an outgoing signal photon to a receiver.
15. The system of claim 12, further comprising means for timing the single photon source by receiving a signal photon from a transmitter by first sampling successive signal pulses to determine a repetition rate of the transmitter.
16. The system of claim 12 further comprising means for accessing information on polarization-basis selection available on a public classical communication channel between the transmitter and the receiver.
17. The system of claim 12 wherein the quantum key is a quantum key-utilizing the BB84 protocol.
US11/693,009 2007-03-29 2007-03-29 Alternative design for quantum cryptographic entangling probe Expired - Fee Related US7876901B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/693,009 US7876901B2 (en) 2007-03-29 2007-03-29 Alternative design for quantum cryptographic entangling probe

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/693,009 US7876901B2 (en) 2007-03-29 2007-03-29 Alternative design for quantum cryptographic entangling probe

Publications (2)

Publication Number Publication Date
US20080240437A1 US20080240437A1 (en) 2008-10-02
US7876901B2 true US7876901B2 (en) 2011-01-25

Family

ID=39794404

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/693,009 Expired - Fee Related US7876901B2 (en) 2007-03-29 2007-03-29 Alternative design for quantum cryptographic entangling probe

Country Status (1)

Country Link
US (1) US7876901B2 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7920704B2 (en) * 2004-10-09 2011-04-05 The United States Of America As Represented By The Secretary Of The Army Systems and methods for obtaining information on a key in BB84 protocol of quantum key distribution
US7876901B2 (en) 2007-03-29 2011-01-25 The United States Of America As Represented By The Secretary Of The Army Alternative design for quantum cryptographic entangling probe

Citations (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5243649A (en) 1992-09-29 1993-09-07 The Johns Hopkins University Apparatus and method for quantum mechanical encryption for the transmission of secure communications
US5307410A (en) 1993-05-25 1994-04-26 International Business Machines Corporation Interferometric quantum cryptographic key distribution system
US5339182A (en) 1993-02-19 1994-08-16 California Institute Of Technology Method and apparatus for quantum communication employing nonclassical correlations of quadrature-phase amplitudes
US5414771A (en) 1993-07-13 1995-05-09 Mrj, Inc. System and method for the creation of random sequences and for the cryptographic protection of communications
US5515438A (en) 1993-11-24 1996-05-07 International Business Machines Corporation Quantum key distribution using non-orthogonal macroscopic signals
US5732139A (en) 1996-08-26 1998-03-24 Lo; Hoi-Kwong Quantum cryptographic system with reduced data loss
US5764765A (en) 1993-09-09 1998-06-09 British Telecommunications Public Limited Company Method for key distribution using quantum cryptography
US5953421A (en) 1995-08-16 1999-09-14 British Telecommunications Public Limited Company Quantum cryptography
US5999285A (en) * 1997-05-23 1999-12-07 The United States Of America As Represented By The Secretary Of The Army Positive-operator-valued-measure receiver for quantum cryptography
US6188768B1 (en) 1998-03-31 2001-02-13 International Business Machines Corporation Autocompensating quantum cryptographic key distribution system based on polarization splitting of light
US6289104B1 (en) 1998-08-07 2001-09-11 Ilinois Institute Of Technology Free-space quantum cryptography system
US6314189B1 (en) 1997-10-02 2001-11-06 Akio Motoyoshi Method and apparatus for quantum communication
US20010055389A1 (en) 2000-04-28 2001-12-27 Hughes Richard J. Method and apparatus for free-space quantum key distribution in daylight
US6438234B1 (en) 1996-09-05 2002-08-20 Swisscom Ag Quantum cryptography device and method
US6473719B1 (en) 1999-01-11 2002-10-29 Ansible, Inc. Method and apparatus for selectively controlling the quantum state probability distribution of entangled quantum objects
US6522749B2 (en) 1999-01-21 2003-02-18 Nec Laboratories America, Inc. Quantum cryptographic communication channel based on quantum coherence
US6529601B1 (en) 1996-05-22 2003-03-04 British Telecommunications Public Limited Company Method and apparatus for polarization-insensitive quantum cryptography
US20030086138A1 (en) 2001-11-06 2003-05-08 Pittman Todd B Techniques for performing logic operations using quantum states of single photons
US6678450B1 (en) 1998-04-24 2004-01-13 The Johns Hopkins University Optical method for quantum computing
US6678379B1 (en) 1999-06-18 2004-01-13 Nec Corporation Quantum key distribution method and apparatus
US6748081B1 (en) 1998-07-24 2004-06-08 Deutsche Telekom Ag Quantum cryptography system for a secure transmission of random keys using a polarization setting method
US6801626B1 (en) 1999-05-12 2004-10-05 Nec Corporation Cryptographic key distribution using light pulses of three macroscopic quantum states
US6895092B2 (en) 2000-08-23 2005-05-17 Nec Corporation Cryptographic key distribution method and apparatus thereof
US7006267B2 (en) * 2002-12-09 2006-02-28 The Johns Hopkins University Techniques for high fidelity quantum teleportation and computing
US20060056630A1 (en) * 2004-09-13 2006-03-16 Zimmer Vincent J Method to support secure network booting using quantum cryptography and quantum key distribution
US7292342B2 (en) * 2004-01-30 2007-11-06 General Dynamics Advanced Information Systems Inc. Entangled photon fourier transform spectroscopy
US7307275B2 (en) 2002-04-04 2007-12-11 D-Wave Systems Inc. Encoding and error suppression for superconducting quantum computers
US20080240437A1 (en) 2007-03-29 2008-10-02 Brandt Howard E Alternative Design for Quantum Cryptographic Entangling Probe
US20090175450A1 (en) 2004-10-09 2009-07-09 Brandt Howard E Systems and methods for obtaining information on a key in BB84 protocol of quantum key distribution

Patent Citations (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5243649A (en) 1992-09-29 1993-09-07 The Johns Hopkins University Apparatus and method for quantum mechanical encryption for the transmission of secure communications
US5339182A (en) 1993-02-19 1994-08-16 California Institute Of Technology Method and apparatus for quantum communication employing nonclassical correlations of quadrature-phase amplitudes
US5307410A (en) 1993-05-25 1994-04-26 International Business Machines Corporation Interferometric quantum cryptographic key distribution system
US5414771A (en) 1993-07-13 1995-05-09 Mrj, Inc. System and method for the creation of random sequences and for the cryptographic protection of communications
US5764765A (en) 1993-09-09 1998-06-09 British Telecommunications Public Limited Company Method for key distribution using quantum cryptography
US5515438A (en) 1993-11-24 1996-05-07 International Business Machines Corporation Quantum key distribution using non-orthogonal macroscopic signals
US5953421A (en) 1995-08-16 1999-09-14 British Telecommunications Public Limited Company Quantum cryptography
US6529601B1 (en) 1996-05-22 2003-03-04 British Telecommunications Public Limited Company Method and apparatus for polarization-insensitive quantum cryptography
US5732139A (en) 1996-08-26 1998-03-24 Lo; Hoi-Kwong Quantum cryptographic system with reduced data loss
US6438234B1 (en) 1996-09-05 2002-08-20 Swisscom Ag Quantum cryptography device and method
US5999285A (en) * 1997-05-23 1999-12-07 The United States Of America As Represented By The Secretary Of The Army Positive-operator-valued-measure receiver for quantum cryptography
US6314189B1 (en) 1997-10-02 2001-11-06 Akio Motoyoshi Method and apparatus for quantum communication
US6188768B1 (en) 1998-03-31 2001-02-13 International Business Machines Corporation Autocompensating quantum cryptographic key distribution system based on polarization splitting of light
US6678450B1 (en) 1998-04-24 2004-01-13 The Johns Hopkins University Optical method for quantum computing
US6748081B1 (en) 1998-07-24 2004-06-08 Deutsche Telekom Ag Quantum cryptography system for a secure transmission of random keys using a polarization setting method
US6289104B1 (en) 1998-08-07 2001-09-11 Ilinois Institute Of Technology Free-space quantum cryptography system
US6473719B1 (en) 1999-01-11 2002-10-29 Ansible, Inc. Method and apparatus for selectively controlling the quantum state probability distribution of entangled quantum objects
US6522749B2 (en) 1999-01-21 2003-02-18 Nec Laboratories America, Inc. Quantum cryptographic communication channel based on quantum coherence
US6801626B1 (en) 1999-05-12 2004-10-05 Nec Corporation Cryptographic key distribution using light pulses of three macroscopic quantum states
US6678379B1 (en) 1999-06-18 2004-01-13 Nec Corporation Quantum key distribution method and apparatus
US20010055389A1 (en) 2000-04-28 2001-12-27 Hughes Richard J. Method and apparatus for free-space quantum key distribution in daylight
US6895092B2 (en) 2000-08-23 2005-05-17 Nec Corporation Cryptographic key distribution method and apparatus thereof
US6741374B2 (en) 2001-11-06 2004-05-25 The Johns Hopkins University Techniques for performing logic operations using quantum states of single photons
US20030086138A1 (en) 2001-11-06 2003-05-08 Pittman Todd B Techniques for performing logic operations using quantum states of single photons
US7307275B2 (en) 2002-04-04 2007-12-11 D-Wave Systems Inc. Encoding and error suppression for superconducting quantum computers
US7006267B2 (en) * 2002-12-09 2006-02-28 The Johns Hopkins University Techniques for high fidelity quantum teleportation and computing
US7292342B2 (en) * 2004-01-30 2007-11-06 General Dynamics Advanced Information Systems Inc. Entangled photon fourier transform spectroscopy
US20060056630A1 (en) * 2004-09-13 2006-03-16 Zimmer Vincent J Method to support secure network booting using quantum cryptography and quantum key distribution
US20090175450A1 (en) 2004-10-09 2009-07-09 Brandt Howard E Systems and methods for obtaining information on a key in BB84 protocol of quantum key distribution
US20080240437A1 (en) 2007-03-29 2008-10-02 Brandt Howard E Alternative Design for Quantum Cryptographic Entangling Probe

Non-Patent Citations (30)

* Cited by examiner, † Cited by third party
Title
A.K. Ekert, "Quantum Cryptography Based on Bell's Theorem," Phys. Rev. Lett. 57, 661-663 (1991).
B.A. Slutsky, et al., "Security of Quantum Cryptography Against Individual Attacks," Phys. Rev. A57, 2383-2398 (1998).
Bennett, "Quantum Cryptography: Public Key Distribution and Coin Tossing", Proceedings of the IEEE International Conference on Computers, Systems & Signal Processing, Bangalore, India (IEEE, New York, 1984, pp. 175-179) Dec. 10-12, 1984.
Brandt, "Eavesdropping optimization for quantum cryptography using a positive operator-valued measure," Physical Review A vol. 59, No. 4 (Apr. 1999), pp. 2665-2669.
Brandt, "Inconclusive rate in quantum key distribution." Phys. Rev. A vol. 64 Issue 4 042316(2001).
Brandt, Howard E.; "Alternative Design for Quantum Cryptographic Entangling Probe", J. Modern Optics, vol. 53, No. 8, May 20, 2006, pp. 1041-1045.
Brandt,"Inconclusive rate as a disturbance measure in quantum cryptography," Phys. Rev. A, vol. 62, Issue 4 042310 (2000).
C. H. Bennett, et al. "Experimental Quantum Cryptography," J. Cryptography 5, 3-28 (1992).
C.A. Fuchs, et al. "Quantum-State Disturbance Versus Information Gain: Uncertainty Relations for Quantum Information," Phys. Rev. A53, 2038-2045 (1996).
C.H. Bennett, "Quantum Cryptography Using Any Two Nonorthogonal States," Phys. Rev. Letter. 68, 3121-3124 (1992).
C.H. Bennett, et al. "Generalized Privacy Amplification,"IIII Trans. Inf. Theor. 41, 1915-1923 (1995).
Coherent operation of a tunable quantum phase gate in cavity QED, A. Rauschenbeutel et al., 1999, The American Physical society. *
Experimental demonstration of quantum logic operations using linear optical elements, J.D. Franson, et al. 2003, Fortschr. Phys. *
G. Vidal, et al., "Universal quantum circuit for two-qubit transformations with three controlled-NOT gates," Phy. Rev. A69, 010301-1-4 (2004).
H. Brandt, "Design For a Quantum Cryptographic Entangling Probe," Journal of Modern Optics, vol. 522, No. 16, Nov. 10, 2005, pp. 2177-2185.
H. Brandt, "Quantum-Crytographic Entangling Probe," Physical Rev. A. 71, 042312 (Apr. 6, 2005).
H.E. Brandt, "Alternative Design for Quantum Cryptographic Entangling Probe," Abstract, Bulletin of the American Physical Society, 2006 APS March Meeting, Monday-Friday, (Mar. 13-17, 2006) Baltimore, MD; http://meetings.aps.org/link/BAPS.2006.MAR.W40.4.
H.E. Brandt, "Conclusive Entangling Probe" Submitted on Sep. 13, 2005, arXiv:quant-ph/0509088.
H.E. Brandt, "Optimization Problem in Quantum Cryptography," J. Optics B5, S557-560. Quantum Semiclass. Opt. 5 (2003).
H.E. Brandt, "Optimized Unitary Transform for BB84 Entangling Probe," SPIE Proceedings, vol. 5436, 48-64 (2004).
H.E. Brandt, "Optimum Probe Parameters for Entangling Probe in Quantum Key Distribution," Quantum Information Processing, vol. 2, Nos. 1-2, 37-79 (2003).
H.E. Brandt, "Positive Operator Valued Measure in Quantum Information Processing," Am. J. Phys. 67, 434-439 (1999).
H.E. Brandt, "Probe Optimization in Four-State Protocol of Quantum Cryptography," Phys. Rev. A66, 032303-1-16 (2002).
H.E. Brandt, "Secrecy Capacity in The Four-State Protocol of Quantum Key Distirbution," J. Math Phys. 43, 4526-4530 (2002).
H.E. Brandt, et al., "Expanded Quantum Cryptographic Entangling Probe," Journal of Modern Optics, vol. 53, No. 13, 1927-1930. (Sep. 10, 2006).
Jeffrey H. Shapiro "Performance Analysis for Brandt's Conclusive Entangling Probe," Quantum Information Processing, vol. 5, No. 1, Feb. 2006.
N. Gisin, et al., Quantum Crptography, Rev, Mod. Phys. 74, 145-192 (2002).
Probe optimization in four-state protocol of quantum cryptography, Howard E. Brandt, 2002, The American Physical society. *
Quantum dots are used to build logic gates, R. Colin Johnson, Apr. 28, 1999, EETimes. *
S. Wiesner, "Conjugate Coding," SIGACT News 15, 78-88 (1983).

Also Published As

Publication number Publication date
US20080240437A1 (en) 2008-10-02

Similar Documents

Publication Publication Date Title
US7920704B2 (en) Systems and methods for obtaining information on a key in BB84 protocol of quantum key distribution
JP7158380B2 (en) Apparatus and method for quantum enhanced physical layer security
US8600051B2 (en) System and method for quantum cryptography
Ekert et al. Practical quantum cryptography based on two-photon interferometry
Fuchs et al. Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy
Fung et al. Security proof of quantum key distribution with detection efficiency mismatch
US9294272B2 (en) System and method for quantum key distribution
US7359514B2 (en) Narrow-band single-photon source and QKD system using same
Lo et al. Quantum cryptography
US20220303130A1 (en) Discrete variable quantum key distribution using conjugate homodyne detection
Tamaki et al. Security of the Bennett 1992 quantum-key distribution protocol against individual attack over a realistic channel
US7876901B2 (en) Alternative design for quantum cryptographic entangling probe
Kasliwal et al. Enhancing satellite‐to‐ground communication using quantum key distribution
US11818258B2 (en) Method and system for quantum key distribution
US20230142045A1 (en) Quantum communications system using pulse divider and associated methods
Botero et al. Quantum-communication protocol employing weak measurements
Brandt Unambiguous state discrimination in quantum key distribution
Jiang et al. High-speed quantum key distribution using dead-time compensated detector arrays
JP4632203B2 (en) Quantum key generation system and quantum key generation method
US11502758B2 (en) Communications system using pulse divider and associated methods
Sekar A Report on Decoy State Quantum Key Distribution
EP4047860A1 (en) Long-distance quantum key distribution
Fürst et al. Free-space quantum key distribution over 144 km
Brandt Conclusive eavesdropping in quantum key distribution
US7907849B1 (en) Secure communication system and method for exchanging data units

Legal Events

Date Code Title Description
AS Assignment

Owner name: GOVERNMENT TO THE UNITED STATES AS REPRESENTED BY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BRANDT, HOWARD E, DR;REEL/FRAME:019083/0013

Effective date: 20070328

CC Certificate of correction
FPAY Fee payment

Year of fee payment: 4

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20190125